Min-Hua Shao

According to our database1, Min-Hua Shao authored at least 17 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment.
IEICE Trans. Inf. Syst., 2012

2011
Long-term Audio Observation by Wireless Sensor Networks with Filtering Strategies.
Ad Hoc Sens. Wirel. Networks, 2011

A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs.
Proceedings of the WOSIS 2011, 2011

2010
A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A study on secure and fair escrow services for digital commerce.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server Environment.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks.
J. Res. Pract. Inf. Technol., 2009

2008
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2008

Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

2007
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party.
Proceedings of the Trust, 2007

An Effective Privacy-Preserving RFID Scheme against Desynchronization.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Protecting mobile-agent data collection against blocking attacks.
Comput. Stand. Interfaces, 2006

Some common attacks against certified email protocols and the countermeasures.
Comput. Commun., 2006

2005
A transactional-cycle approach to evidence management for dispute resolution.
Inf. Manag., 2005

On the Security of a Certified E-Mail Scheme with Temporal Authentication.
Proceedings of the Computational Science and Its Applications, 2005

2003
Establishing Chain of Evidence as a Base for Non-Repudiation Services.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003


  Loading...